期刊文献+
共找到29篇文章
< 1 2 >
每页显示 20 50 100
The Immense Impact of Reverse Edges on Large Hierarchical Networks
1
作者 Haosen Cao Bin-Bin Hu +7 位作者 Xiaoyu Mo Duxin Chen Jianxi Gao Ye Yuan Guanrong Chen Tamás Vicsek Xiaohong Guan Hai-Tao Zhang 《Engineering》 SCIE EI CAS CSCD 2024年第5期240-249,共10页
Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so forth.The struc... Hierarchical networks are frequently encountered in animal groups,gene networks,and artificial engineering systems such as multiple robots,unmanned vehicle systems,smart grids,wind farm networks,and so forth.The structure of a large directed hierarchical network is often strongly influenced by reverse edges from lower-to higher-level nodes,such as lagging birds’howl in a flock or the opinions of lowerlevel individuals feeding back to higher-level ones in a social group.This study reveals that,for most large-scale real hierarchical networks,the majority of the reverse edges do not affect the synchronization process of the entire network;the synchronization process is influenced only by a small part of these reverse edges along specific paths.More surprisingly,a single effective reverse edge can slow down the synchronization of a huge hierarchical network by over 60%.The effect of such edges depends not on the network size but only on the average in-degree of the involved subnetwork.The overwhelming majority of active reverse edges turn out to have some kind of“bunching”effect on the information flows of hierarchical networks,which slows down synchronization processes.This finding refines the current understanding of the role of reverse edges in many natural,social,and engineering hierarchical networks,which might be beneficial for precisely tuning the synchronization rhythms of these networks.Our study also proposes an effective way to attack a hierarchical network by adding a malicious reverse edge to it and provides some guidance for protecting a network by screening out the specific small proportion of vulnerable nodes. 展开更多
关键词 SYNCHRONIZABILITY Large hierarchical networks Reverse edges information flows Complex networks
下载PDF
Impacts of central-Pacific El Niño and physical drivers on eastern Pacific bigeye tuna
2
作者 Peng LIAN Le GAO 《Journal of Oceanology and Limnology》 SCIE CAS CSCD 2024年第3期972-987,共16页
Bigeye tuna Thunnus obesus is an important migratory species that forages deeply,and El Niño events highly influence its distribution in the eastern Pacific Ocean.While sea surface temperature is widely recognize... Bigeye tuna Thunnus obesus is an important migratory species that forages deeply,and El Niño events highly influence its distribution in the eastern Pacific Ocean.While sea surface temperature is widely recognized as the main factor affecting bigeye tuna(BET)distribution during El Niño events,the roles of different types of El Niño and subsurface oceanic signals,such as ocean heat content and mixed layer depth,remain unclear.We conducted A spatial-temporal analysis to investigate the relationship among BET distribution,El Niño events,and the underlying oceanic signals to address this knowledge gap.We used monthly purse seine fisheries data of BET in the eastern tropical Pacific Ocean(ETPO)from 1994 to 2012 and extracted the central-Pacific El Niño(CPEN)indices based on Niño 3 and Niño 4indexes.Furthermore,we employed Explainable Artificial Intelligence(XAI)models to identify the main patterns and feature importance of the six environmental variables and used information flow analysis to determine the causality between the selected factors and BET distribution.Finally,we analyzed Argo datasets to calculate the vertical,horizontal,and zonal mean temperature differences during CPEN and normal years to clarify the oceanic thermodynamic structure differences between the two types of years.Our findings reveal that BET distribution during the CPEN years is mainly driven by advection feedback of subsurface warmer thermal signals and vertically warmer habitats in the CPEN domain area,especially in high-yield fishing areas.The high frequency of CPEN events will likely lead to the westward shift of fisheries centers. 展开更多
关键词 bigeye tuna central-Pacific El Niño(CPEN) ocean heat content ARGO explainable artificial intelligence(XAI) information flow
下载PDF
Distributed Information Flow Verification for Secure Service Composition in Smart Sensor Network 被引量:3
3
作者 XI Ning SUN Cong +2 位作者 MA Jianfeng CHEN Xiaofeng SHEN Yulong 《China Communications》 SCIE CSCD 2016年第4期119-130,共12页
Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, dif... Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, different sensor nodes can cooperate and compose with each other to complete more complicated tasks for user. However, because of the regional characteristic of sensor nodes, merging data with different sensitivities become a primary requirement to the composite services, and information flow security should be intensively considered during service composition. In order to mitigate the great cost caused by the complexity of modeling and the heavy load of single-node verification to the energy-limited sensor node, in this paper, we propose a new distributed verification framework to enforce information flow security on composite services of smart sensor network. We analyze the information flows in composite services and specify security constraints for each service participant. Then we propose an algorithm over the distributed verification framework involving each sensor node to participate in the composite service verification based on the security constraints. The experimental results indicate that our approach can reduce the cost of verification and provide a better load balance. 展开更多
关键词 information flow security service composition formal verification smart sensor network
下载PDF
Information Flow Security Models for Cloud Computing 被引量:3
4
作者 Congdong Lv Ji Zhang +1 位作者 Zhoubao Sun Gang Qian 《Computers, Materials & Continua》 SCIE EI 2020年第12期2687-2705,共19页
Cloud computing provides services to users through Internet.This open mode not only facilitates the access by users,but also brings potential security risks.In cloud computing,the risk of data leakage exists between u... Cloud computing provides services to users through Internet.This open mode not only facilitates the access by users,but also brings potential security risks.In cloud computing,the risk of data leakage exists between users and virtual machines.Whether direct or indirect data leakage,it can be regarded as illegal information flow.Methods,such as access control models can control the information flow,but not the covert information flow.Therefore,it needs to use the noninterference models to detect the existence of illegal information flow in cloud computing architecture.Typical noninterference models are not suitable to certificate information flow in cloud computing architecture.In this paper,we propose several information flow models for cloud architecture.One model is for transitive cloud computing architecture.The others are for intransitive cloud computing architecture.When concurrent access actions execute in the cloud architecture,we want that security domain and security domain do not affect each other,that there is no information flow between security domains.But in fact,there will be more or less indirect information flow between security domains.Our models are concerned with how much information is allowed to flow.For example,in the CIP model,the other domain can learn the sequence of actions.But in the CTA model,the other domain can’t learn the information.Which security model will be used in an architecture depends on the security requirements for that architecture. 展开更多
关键词 Cloud computing security information flow security NONINTERFERENCE noninterference models
下载PDF
Information Flow Scheduling in Concurrent Multi-Product Development Based on DSM 被引量:1
5
作者 Qing-Chao Sun Wei-Qiang Huang +1 位作者 Ying-Jie Jiang Wei Sun 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2017年第5期1101-1111,共11页
Multi-product collaborative development is adopted widely in manufacturing enterprise, while the present multi-project planning models don't take techni- cal/data interactions of multiple products into account. To de... Multi-product collaborative development is adopted widely in manufacturing enterprise, while the present multi-project planning models don't take techni- cal/data interactions of multiple products into account. To decrease the influence of technical/data interactions on project progresses, the information flow scheduling models based on the extended DSM is presented. Firstly, infor- mation dependencies are divided into four types: series, parallel, coupling and similar. Secondly, different types of dependencies are expressed as DSM units, and the exten- ded DSM model is brought forward, described as a block matrix. Furthermore, the information flow scheduling methods is proposed, which involves four types of opera- tions, where partitioning and clustering algorithm are modified from DSM for ensuring progress of high-priority project, merging and converting is the specific computation of the extended DSM. Finally, the information flow scheduling of two machine tools development is analyzed with example, and different project priorities correspond to different task sequences and total coordination cost. The proposed methodology provides a detailed instruction for information flow scheduling in multi-product development, with specially concerning technical/data interactions. 展开更多
关键词 Concurrent multi-product development information flow planning Extended DSM Projectpriority
下载PDF
The Information Flow Analyzing Based on CPC 被引量:1
6
作者 张璋 李辉 《Journal of Electronic Science and Technology of China》 2005年第4期377-379,共3页
The information flow chart within product life cycle is given out based on collaborative production commerce (CPC) thoughts. In this chart, the separated information systems are integrated by means of enterprise kno... The information flow chart within product life cycle is given out based on collaborative production commerce (CPC) thoughts. In this chart, the separated information systems are integrated by means of enterprise knowledge assets that are promoted by CPC from production knowledge. The information flow in R&D process is analyzed in the environment of virtual R&D group and distributed PDM. In addition, the information flow throughout the manufacturing and marketing process is analyzed in CPC environment. 展开更多
关键词 information flow collaborative production commerce PDM
下载PDF
Evolving a Bayesian network model with information flow for time series interpolation of multiple ocean variables
7
作者 Ming Li Ren Zhang Kefeng Liu 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2021年第7期249-262,共14页
Based on Bayesian network (BN) and information flow (IF),a new machine learning-based model named IFBN is put forward to interpolate missing time series of multiple ocean variables. An improved BN structural learning ... Based on Bayesian network (BN) and information flow (IF),a new machine learning-based model named IFBN is put forward to interpolate missing time series of multiple ocean variables. An improved BN structural learning algorithm with IF is designed to mine causal relationships among ocean variables to build network structure. Nondirectional inference mechanism of BN is applied to achieve the synchronous interpolation of multiple missing time series. With the IFBN,all ocean variables are placed in a causal network visually,making full use of information about related variables to fill missing data. More importantly,the synchronous interpolation of multiple variables can avoid model retraining when interpolative objects change. Interpolation experiments show that IFBN has even better interpolation accuracy,effectiveness and stability than existing methods. 展开更多
关键词 Bayesian network information flow time series interpolation ocean variables
下载PDF
Functional connectivity and information flow in cerebral motor regions of healthy people following finger movement training
8
作者 Zeqiang Yang Dongmei Hao Ying Li Yanping Bai 《Neural Regeneration Research》 SCIE CAS CSCD 2010年第9期710-714,共5页
BACKGROUND:Neuro-rehabilitative training has been shown to promote motor function recovery in stroke patients,although the underlying mechanisms have not been fully clarified.OBJECTIVE:To investigate the effects of ... BACKGROUND:Neuro-rehabilitative training has been shown to promote motor function recovery in stroke patients,although the underlying mechanisms have not been fully clarified.OBJECTIVE:To investigate the effects of finger movement training on functional connectivity and information flow direction in cerebral motor areas of healthy people using electroencephalogram (EEG).DESIGN,TIME AND SETTING:A self-controlled,observational study was performed at the College of Life Science and Bioengineering,Beijing University of Technology between December 2008 and April 2009.PARTICIPANTS:Nineteen healthy adults,who seldom played musical instruments or keyboards,were included in the present study.METHODS:Specific finger movement training was performed,and all subjects were asked to separately press keys with their left or right hand fingers,according to instructions.The task comprised five sessions of test train test train-test.Thirty-six channel EEG signals were recorded in different test sessions prior to and after training.Data were statistically analyzed using one-way analysis of variance.MAIN OUTCOME MEASURES:The number of effective performances,correct ratio,average response time,average movement time,correlation coefficient between pairs of EEG channels,and information flow direction in motor regions were analyzed and compared between different training sessions.RESULTS:Motor function of all subjects was significantly improved in the third test comparedwith the first test (P〈 0.01).More than 80% of connections were strengthened in the motor-related areas following two training sessions,in particular the primary motor regions under the C4 electrode.Compared to the first test,a greater amount of information flowed from the Cz and Fcz electrodes (corresponding to supplementary motor area) to the C4 electrode in the third test.CONCLUSION:Finger task training increased motor ability in subjects by strengthening connections and changing information flow in the motor areas.These results provided a greater understanding of the mechanisms involved in motor rehabilitation. 展开更多
关键词 motor cortex functional connectivity information flow direction ELECTROENCEPHALOGRAM
下载PDF
Performance Improvement in Manufacturing Shop Floor Operations of Developing Countries Based on Three Characteristics of Information Flow
9
作者 Joseph Voufo André Marie Mbakop +3 位作者 Florent Biyeme Rolland Djomi Pélagie Flore Nanfack Temgoua Jean Raymond Lucien Meva’a 《Journal of Computer and Communications》 2022年第3期46-65,共20页
The management of information flow for production improvement has always been a target in the research. In this paper, the focus is on the analysis model of the characteristics of information flow in shop floor operat... The management of information flow for production improvement has always been a target in the research. In this paper, the focus is on the analysis model of the characteristics of information flow in shop floor operations based on the influence that dimension (support or medium), direction and the quality information flow have on the value of information flow using machine learning classification algorithms. The obtained results of classification algorithms used to analyze the value of information flow are Decision Trees (DT) and Random Forest (RF) with a score of 0.99% and the mean absolute error of 0.005. The results also show that the management of information flow using DT or RF shows that, the dimension of information such as digital information has the greatest value of information flow in shop floor operations when the shop floor is totally digitalized. Direction of information flow does not have any great influence on shop floor operations processes when the operations processes are digitalized or done by operators as machines. 展开更多
关键词 Developing Countries information Flow Characteristics Machine Learning Shop Floor Operations Value of information Flow
下载PDF
Measuring the Evolution and Influence in Society’s Information Networks
10
作者 Xiaocun Mao Tingting Dong +1 位作者 Meng Li Zhenping Li 《Journal of Applied Mathematics and Physics》 2016年第4期677-685,共9页
We develop a series of mathematical models to describe flow of information in different periods of time and the relationship between flow of information and inherent value. We optimize the diffusion mechanism of infor... We develop a series of mathematical models to describe flow of information in different periods of time and the relationship between flow of information and inherent value. We optimize the diffusion mechanism of information based on model SEIR and improve the diffusion mechanism. In order to explore how inherent value of the information affects the flow of information, we simulate the model by using Matalab. We also use the data that the number of people is connected to Internet in Canada from the year 2009 to 2014 to analysis the model’s reliability. Then we use the model to predict the communication networks’ relationships and capacities around the year 2050. Last we do sensitivity analysis by making small changes in parameters of simulation experiment. The result of the experiment is helpful to model how public interest and opinion can be changed in complex network. 展开更多
关键词 Flow of information SEIR Model Dynamic Equations Complex Network
下载PDF
A time sequence analysis on the informal information flow mechanism of microblogging
11
作者 Yuan HU Xiaoli LIAO Andong WU 《Chinese Journal of Library and Information Science》 2011年第Z1期68-81,共14页
Microblog is a new Internet featured product, which has seen a rapid development in recent years. Researchers from different countries are making various technical analyses on microblogging applications. In this study... Microblog is a new Internet featured product, which has seen a rapid development in recent years. Researchers from different countries are making various technical analyses on microblogging applications. In this study, through using the natural language processing(NLP) and data mining, we analyzed the information content transmitted via a microblog, users' social networks and their interactions, and carried out an empirical analysis on the dissemination process of one particular piece of information via Sina Weibo.Based on the result of these analyses, we attempt to develop a better understanding about the rule and mechanism of the informal information flow in microblogging. 展开更多
关键词 Microblog information flow model Social network information dissemination
下载PDF
DuFNet:Dual Flow Network of Real-Time Semantic Segmentation for Unmanned Driving Application of Internet of Things 被引量:1
12
作者 Tao Duan Yue Liu +2 位作者 Jingze Li Zhichao Lian d Qianmu Li 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期223-239,共17页
The application of unmanned driving in the Internet of Things is one of the concrete manifestations of the application of artificial intelligence technology.Image semantic segmentation can help the unmanned driving sy... The application of unmanned driving in the Internet of Things is one of the concrete manifestations of the application of artificial intelligence technology.Image semantic segmentation can help the unmanned driving system by achieving road accessibility analysis.Semantic segmentation is also a challenging technology for image understanding and scene parsing.We focused on the challenging task of real-time semantic segmentation in this paper.In this paper,we proposed a novel fast architecture for real-time semantic segmentation named DuFNet.Starting from the existing work of Bilateral Segmentation Network(BiSeNet),DuFNet proposes a novel Semantic Information Flow(SIF)structure for context information and a novel Fringe Information Flow(FIF)structure for spatial information.We also proposed two kinds of SIF with cascaded and paralleled structures,respectively.The SIF encodes the input stage by stage in the ResNet18 backbone and provides context information for the feature fusionmodule.Features from previous stages usually contain rich low-level details but high-level semantics for later stages.Themultiple convolutions embed in Parallel SIF aggregate the corresponding features among different stages and generate a powerful global context representation with less computational cost.The FIF consists of a pooling layer and an upsampling operator followed by projection convolution layer.The concise component provides more spatial details for the network.Compared with BiSeNet,our work achieved faster speed and comparable performance with 72.34%mIoU accuracy and 78 FPS on Cityscapes Dataset based on the ResNet18 backbone. 展开更多
关键词 Real-time semantic segmentation convolutional neural network feature fusion unmanned driving fringe information flow
下载PDF
Impact of trading hours extensions on foreign exchange volatility:intraday evidence from the Moscow exchange
13
作者 Michael Frommel Eyup Kadioglu 《Financial Innovation》 2023年第1期2729-2751,共23页
Using transaction-level tick-by-tick data of same-and next-day settlement of the Russian Ruble versus the US Dollar exchange rate(RUB/USD)traded on the Moscow Exchange Market during the period 2005–2013,we analyze th... Using transaction-level tick-by-tick data of same-and next-day settlement of the Russian Ruble versus the US Dollar exchange rate(RUB/USD)traded on the Moscow Exchange Market during the period 2005–2013,we analyze the impact of trading hours extensions on volatility.During the sample period,the Moscow Exchange extended trading hours three times for the same-day settlement and two times for the next-day settlement of the RUB/USD rate.To analyze the effect of the implementations,various measures of historical and realized volatility are calculated for 5-and 15-min intraday intervals spanning a period of three months both prior to and following trading hours extensions.Besides historical volatility measures,we also examine volume and spread.We apply an autoregressive moving average-autoregressive conditional heteroscedasticity(ARMA-GARCH)model utilizing realized volatility and a trade classification rule to estimate the probability of informed trading.The extensions of trading hours cause a significant increase in both volatility and volume for further analyzing the reasons behind volatility changes.Volatility changes mostly occur after the opening of the market.The length of the extension has a significant positive effect on realized volatility.The results indicate that informed trading increased substantially after the opening for the rate of same-day settlement,whereas this is not observed for next-day settlement.Although trading hours extensions raise opportunities for more transactions and liquidity in foreign exchange markets,they may also lead to higher volatility in the market.Furthermore,this distortion is more significant at opening and midday.A potential explanation for the increased volatility mostly at the opening is that the trading hours extension attracts informed traders rather than liquidity providers. 展开更多
关键词 VOLATILITY Trading hours extension Foreign exchange market Informed trading Volume Spread Market overlap information flow
下载PDF
Dynamic Event-Triggered Scheduling and Platooning Control Co-Design for Automated Vehicles Over Vehicular Ad-Hoc Networks 被引量:26
14
作者 Xiaohua Ge Shunyuan Xiao +2 位作者 Qing-Long Han Xian-Ming Zhang Derui Ding 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2022年第1期31-46,共16页
This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is pr... This paper deals with the co-design problem of event-triggered communication scheduling and platooning control over vehicular ad-hoc networks(VANETs)subject to finite communication resource.First,a unified model is presented to describe the coordinated platoon behavior of leader-follower vehicles in the simultaneous presence of unknown external disturbances and an unknown leader control input.Under such a platoon model,the central aim is to achieve robust platoon formation tracking with desired inter-vehicle spacing and same velocities and accelerations guided by the leader,while attaining improved communication efficiency.Toward this aim,a novel bandwidth-aware dynamic event-triggered scheduling mechanism is developed.One salient feature of the scheduling mechanism is that the threshold parameter in the triggering law is dynamically adjusted over time based on both vehicular state variations and bandwidth status.Then,a sufficient condition for platoon control system stability and performance analysis as well as a co-design criterion of the admissible event-triggered platooning control law and the desired scheduling mechanism are derived.Finally,simulation results are provided to substantiate the effectiveness and merits of the proposed co-design approach for guaranteeing a trade-off between robust platooning control performance and communication efficiency. 展开更多
关键词 Automated vehicles dynamic event-triggered communication information flow topology platooning control vehicular ad-hoc networks(VANETs)
下载PDF
AN ENLARGEMENT OF FILTRATION FOR BROWNIAN MOTION 被引量:2
15
作者 胡耀忠 《Acta Mathematica Scientia》 SCIE CSCD 2011年第5期1671-1678,共8页
Let Bt be an Ft Brownian motion and Gt be an enlargement of filtration of Ft from some Gaussian random variables. We obtain equations for ht such that Bt ht is a Gt-Brownian motion.
关键词 Brownian motion enlargement of filtration information flow
下载PDF
A super-network equilibrium optimization method for operation architecture with fuzzy demands 被引量:2
16
作者 XING Qinghua GAO Jiale 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第5期969-982,共14页
From the view of information flow, a super-network equilibrium optimization model is proposed to compute the solution of the operation architecture which is made up of a perceptive level, a command level and a firepow... From the view of information flow, a super-network equilibrium optimization model is proposed to compute the solution of the operation architecture which is made up of a perceptive level, a command level and a firepower level. Firstly, the optimized conditions of the perceptive level, command level and firepower level are analyzed respectively based on the demand of information relation,and then the information supply-and-demand equilibrium model of the operation architecture super-network is established. Secondly,a variational inequality transformation(VIT) model for equilibrium optimization of the operation architecture is given. Thirdly, the contraction projection algorithm for solving the operation architecture super-network equilibrium optimization model with fuzzy demands is designed. Finally, numerical examples are given to prove the validity and rationality of the proposed method, and the influence of fuzzy demands on the super-network equilibrium solution of operation architecture is discussed. 展开更多
关键词 super-network equilibrium operation architecture fuzzy demand information flow variational inequality transformation
下载PDF
Exploring the Big Data Using a Rigorous and Quantitative Causality Analysis 被引量:2
17
作者 X. San Liang 《Journal of Computer and Communications》 2016年第5期53-59,共7页
Causal analysis is a powerful tool to unravel the data complexity and hence provide clues to achieving, say, better platform design, efficient interoperability and service management, etc. Data science will surely ben... Causal analysis is a powerful tool to unravel the data complexity and hence provide clues to achieving, say, better platform design, efficient interoperability and service management, etc. Data science will surely benefit from the advancement in this field. Here we introduce into this community a recent finding in physics on causality and the subsequent rigorous and quantitative causality analysis. The resulting formula is concise in form, involving only the common statistics namely sample covariance. A corollary is that causation implies correlation, but not vice versa, resolving the long-standing philosophical debate over correlation versus causation. The applicability to big data analysis is validated with time series purportedly generated with hidden processes. As a demonstration, a preliminary application to the gross domestic product (GDP) data of United States, China, and Japan reveals some subtle USA-China-Japan relations in certain periods.   展开更多
关键词 CAUSALITY Big Data information Flow Time Series Causal Network
下载PDF
Analysis and Application for Integrity Model on Trusted Platform
18
作者 TUGuo-qing ZHANGHuan-guo WANGLi-na YUDan-dan 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期35-38,共4页
To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)' s recommendation, we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with inf... To build a trusted platform based on Trusted Computing Platform Alliance(TCPA)' s recommendation, we analyze the integrity mechanism for such a PC platfoim in this paper.By combinning access control model with information flow model, we put forwarda combinedprocess-based lattice model to enforce security This moelel creates a trust chain by which we canmanage a series of processes from a core root of trust module to some other application modules Inthe model, once the trust chain is created andmanaged cor-rectly, the integrity of the computer'shardware and sofware has bctn maintained, so does the confidentiality and authenticity. Moreover, arelevant implementation of the model is explained. 展开更多
关键词 tiusted computing access control model information flow model trust chain INTEGRITY
下载PDF
Using information flow analysis to detect implicit information leaks for web service composition 被引量:2
19
作者 Jia-xin JIANG Zhi-qiu HUANG +1 位作者 Wei-wei MA Yan CAO 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第4期494-502,共9页
Information leak,which can undermine the compliance of web-service-composition business processes for some policies,is one of the major concerns in web service composition.We present an automated and effective approac... Information leak,which can undermine the compliance of web-service-composition business processes for some policies,is one of the major concerns in web service composition.We present an automated and effective approach for the detection of implicit information leaks in business process execution language(BPEL)based on information flow analysis.We introduce an adequate meta-model for BPEL representation based on a Petri net for transformation and analysis.Building on the concept of Petri net place-based noninterference,the core contribution of this paper is the application of a Petri net reachability graph to estimate Petri net interference and thereby to detect implicit information leaks in web service composition.In addition,a case study illustrates the application of the approach on a concrete workflow in BPEL notation. 展开更多
关键词 information flow analysis Business process execution language Petri net INTERFERENCE
原文传递
A Multi-Flow Information Flow Tracking Approach for Proving Quantitative Hardware Security Properties 被引量:1
20
作者 Yu Tai Wei Hu +2 位作者 Lu Zhang Dejun Mu Ryan Kastner 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2021年第1期62-71,共10页
Information Flow Tracking(IFT)is an established formal method for proving security properties related to confidentiality,integrity,and isolation.It has seen promise in identifying security vulnerabilities resulting fr... Information Flow Tracking(IFT)is an established formal method for proving security properties related to confidentiality,integrity,and isolation.It has seen promise in identifying security vulnerabilities resulting from design flaws,timing channels,and hardware Trojans for secure hardware design.However,existing IFT methods tend to take a qualitative approach and only enforce binary security properties,requiring strict non-interference for the properties to hold while real systems usually allow a small amount of information flows to enable desirable interactions.Consequently,existing methods are inadequate for reasoning about quantitative security properties or measuring the security of a design in order to assess the severity of a security vulnerability.In this work,we propose two multi-flow solutions—multiple verifications for replicating existing IFT model and multi-flow IFT method.The proposed multi-flow IFT method provides more insight into simultaneous information flow behaviors and allows for proof of quantitative information flow security properties,such as diffusion,randomization,and boundaries on the amount of simultaneous information flows.Experimental results show that our method can be used to prove a new type of information flow security property with verification performance benefits. 展开更多
关键词 hardware security information Flow Tracking(IFT) multi-flow IFT security property
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部